Results 21 to 30 of about 24,566 (328)

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

QKD-Enhanced Cybersecurity Protocols

open access: yesIEEE Photonics Journal, 2021
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj   +1 more source

Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense [PDF]

open access: yes, 2016
We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in ...
Filip, Radim, Usenko, Vladyslav C.
core   +7 more sources

Post-quantum distributed ledger technology: a systematic survey

open access: yesScientific Reports, 2023
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida   +4 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems [PDF]

open access: yesITM Web of Conferences
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks.
Kumar Bathala Naresh   +5 more
doaj   +1 more source

Post-quantum Cryptography in 6G

open access: yes, 2021
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a contemporary computer, but which we can efficiently solve on a quantum one. One of these problems is the discrete logarithm problem (DLP) which is the basis of modern asymmetric cryptography.
openaire   +3 more sources

Device-Independent Relativistic Quantum Bit Commitment [PDF]

open access: yes, 2015
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core   +3 more sources

Home - About - Disclaimer - Privacy